Background Paths
Background Paths

SaadSaid

Security Researcher  ·  Go / C / Rust

scroll ↓

// 01.

About

profile --target saadsaid158zsh

./recon.sh --profile saadsaid158

[*]targetsaadsaid158
[*]locationUnited Kingdom
[*]age17
[+]rolesecurity researcher / exploit dev
[+]languagesGo (primary) · C · Rust · Bash
[+]focusoffensive security · red team · malware research
[+]toolsGhidra · Metasploit · Burp Suite · Wireshark
[+]statusopen to opportunities

0

Years old

0+

Public projects

0

CVEs researched

A-Level

UK student

// 02.

Projects

Fusée Gelée PoC

Go-based implementation of CVE-2018-6242 — a coldboot BootROM exploit targeting NVIDIA Tegra X1 chips in Nintendo Switch units. Features TUI, payload management, SHA256 verification, multi-device support, and JSON config. Cross-platform.

View on GitHub

C2 Framework

A modular red team command-and-control framework. Cross-platform C implants (Windows + Linux) with a Go teamserver, multi-operator CLI, OTA update system, and a production build pipeline.

View on GitHub

Passman

Offline-first secret manager using AES-256-GCM and Argon2id for hardened key derivation. Implements fully encrypted vaults for credentials, TOTP secrets, and files with integrity checks and zero network surface.

View on GitHub

Chess Engine

A compact chess engine in Go with bitboard board representation, iterative deepening alpha-beta search, and perft validation. Two front ends: a local browser UI and UCI mode for standard chess GUIs.

View on GitHub

// 03.

Skills

Exploit DevRev EngTool DevPrivilege EscNet AnalysisMalware Res806065707562

// proficiency · hands-on experience

// tech stack & tools

Goprimary
Csystems
Rustsystems
Bashautomation
GhidraRE
Wiresharkanalysis
Metasploitexploitation
Burp Suiteweb sec
Linuxprimary OS

// 04.

Contact

Open to collaborations, research projects, and opportunities.

or find me on GitHub and TryHackMe